• Stars
    star
    290
  • Rank 142,981 (Top 3 %)
  • Language
    PowerShell
  • License
    Apache License 2.0
  • Created about 8 years ago
  • Updated about 5 years ago

Reviews

There are no reviews yet. Be the first to send feedback to the community and the maintainers!

Repository Details

PowerShell - Rapid Response... For the incident responder in you!

PoSh-R2PowerShell - Rapid Response (PoSH-R2)... For the incident responder in you!

PoSH-R2 is a set of Windows Management Instrumentation (WMI) scripts that investigators and forensic analysts can use to retrieve information from a compromised (or potentially compromised) Windows system. The scripts use WMI to pull this information from the operating system. Therefore, this script will need to be executed with a user that has the necessary privileges and authentication is done via a Network logon. Retreived data is written to CSVs and SQLite databases on the system running the script.

In a single execution, PoSH-R2 will retrieve the following data from an individual machine or a group of systems:

    - Autorun entries
    - Disk info
    - Environment variables
    - Event logs (50 lastest)
    - Installed Software
    - Logon sessions
    - List of drivers
    - List of mapped network drives
    - List of running processes
    - Logged in user
    - Local groups
    - Local user accounts
    - Network configuration
    - Network connections
    - Patches
    - Scheduled tasks with AT command
    - Shares
    - Services
    - System Information

Usage

  1. Call upon the script from a PowerShell window with applicable rights for WMI and follow the prompts.
  2. Data will be saved to a new directory called "PoSH_R2--Results" within the same directory from which this script was executed from.

Additional Notes

  • This script will work with PowerShell version 2 and above

Screenshots


Running the script
Alt text

A listing of the results written to csv files
Alt text


A listing of the databases
Alt text


Reading the data back into PowerShell using out-gridview (import-csv .<some_file.csv> | out-gridview)
Alt text

Filtering only on splunk.exe. From the screenshot, we see it is running on six systems
Alt text

More Repositories

1

PowerShell

A series of scripts
PowerShell
93
star
2

Invoke-HiveNightmare

PoC for CVE-2021-36934, which enables a standard user to be able to retrieve the SAM, Security, and Software Registry hives in Windows 10 version 1809 or newer
PowerShell
35
star
3

AutomatedProfiler

Automated forensics written in PowerShell
Perl
32
star
4

Group_Policy

A series of GPO templates
18
star
5

BlueSpectrum

An IOC framework written in PowerShell
PowerShell
16
star
6

Anydesk_Forensics

PowerShell
12
star
7

Invoke-SRUMDump

A pure PowerShell/ .NET DFIR capability that dumps the Windows SRUM (System Resource Usage Monitor) database to CSVs for analysis.
PowerShell
12
star
8

Invoke-Fail2Ban

PowerShell version of Fail2Ban
PowerShell
11
star
9

TeamViewer_Forensics

A series of functions to parse Teamviewer logs to answer specific questions
PowerShell
9
star
10

EIF_Parser

Evil Inject Finder Remote Capability and Parser
PowerShell
9
star
11

McAfee_ePO

Custom Queries, Dashboards, and HIPs Rules
9
star
12

PoSh-R2_GUI

GUI version of PoSh-R2
PowerShell
9
star
13

Hunters_Hub

Custom Splunk App
CSS
7
star
14

Invoke-AZExplorer

Microsoft Azure Survey
PowerShell
7
star
15

Invoke-GhostLog

Removal of certain event logs within a Windows OS
PowerShell
7
star
16

Invoke-Unbup

Decrypts McAfee quarantine files
PowerShell
5
star
17

IIS_Log_Parser

IIS Logs
PowerShell
5
star
18

ConnectWise_Forensics

PowerShell
5
star
19

SkittleGrinder

Linux Log Collector
Shell
5
star
20

EventLog_Parsers

Series of scripts to parse the event log for analysis
PowerShell
4
star
21

Invoke-HAFNIUMCheck.ps1

Script used to identify compromise via CVEs 2021-26855, 26857, 26858, and 27065
PowerShell
4
star
22

UnderTheWire

PowerShell gaming server site
HTML
3
star
23

Briefs-and-Guides

2
star
24

Invoke-ProcessSuspend

Suspending Processes using PS
PowerShell
2
star
25

YarPoSh

Remoting Capability for Deploying YARA Across an Enterprise
PowerShell
2
star
26

WMI_Watcher

PowerShell
2
star
27

BareMonkey

Volatility plugin parser
Shell
2
star
28

Invoke-PrinterNightmareResponse

PowerShell
1
star
29

PoSh_git

A git-like environment in PowerShell
PowerShell
1
star
30

Invoke-HiveDreams

A capability to identify and remediate CVE-2021-36934 (HiveNightmare)
PowerShell
1
star
31

McAfee_ESM

Custom Dashboards
1
star
32

PoSh-Bitvise-Log-Parser

Parsing Bitvise logs with PowerShell
PowerShell
1
star
33

CVE-Checker

Collection of script to check for CVEs
Shell
1
star
34

Invoke-HashFinder

Searches for a supplied list of SHA1 or SHA256 hashes on a system. Requires either a file size or creation date that is associated with the binary that the hashes were retrieved from.
PowerShell
1
star